CVE-2025-15193: Buffer Overflow in D-Link DWR-M920
A vulnerability was detected in D-Link DWR-M920 up to 1.1.50. This affects the function sub_423848 of the file /boafrm/formParentControl. Performing manipulation of the argument submit-url results in buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-15193 is a critical buffer overflow vulnerability identified in the D-Link DWR-M920 router firmware versions 1.1.0 through 1.1.50. The vulnerability resides in the function sub_423848 located in the /boafrm/formParentControl file. Specifically, the issue arises from improper handling of the 'submit-url' parameter, which can be manipulated to overflow a buffer. This overflow can lead to arbitrary code execution with elevated privileges, as the router firmware likely runs with high system rights. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 score of 8.7 reflects the ease of exploitation (network vector, low complexity), lack of required privileges or user interaction, and the high impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public availability of exploit code significantly raises the threat level. The DWR-M920 is a widely deployed 4G LTE router used in various enterprise and industrial environments, making this vulnerability particularly concerning. Attackers exploiting this flaw could gain persistent control over the device, intercept or manipulate network traffic, disrupt connectivity, or use the device as a foothold for lateral movement within networks.
Potential Impact
For European organizations, the impact of CVE-2025-15193 is substantial. Compromise of D-Link DWR-M920 routers could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of critical services relying on these devices for connectivity. Industrial and enterprise sectors using these routers for remote or mobile network access are at heightened risk of operational downtime and data breaches. Given the router’s role as a network gateway, attackers could pivot to other internal systems, escalating the severity of the breach. The public exploit availability increases the likelihood of targeted attacks or opportunistic scanning campaigns across Europe. Organizations in sectors such as manufacturing, logistics, telecommunications, and public services that deploy these routers may face significant operational and reputational damage if exploited. Additionally, the lack of patches or delayed patching could prolong exposure, especially in environments where firmware updates are challenging to deploy rapidly.
Mitigation Recommendations
1. Immediate firmware update: Organizations should verify if D-Link has released a patch or updated firmware beyond version 1.1.50 and apply it promptly. 2. Disable remote management interfaces on the DWR-M920 to reduce attack surface. 3. Implement network segmentation to isolate vulnerable routers from critical internal networks. 4. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting the 'submit-url' parameter or related traffic anomalies. 5. Monitor network traffic for unusual patterns or spikes in requests to the /boafrm/formParentControl endpoint. 6. Where patching is not immediately feasible, consider temporary compensating controls such as firewall rules blocking external access to router management ports. 7. Conduct regular vulnerability scanning and penetration testing focusing on network edge devices. 8. Educate IT staff on the risks and signs of exploitation to enable rapid incident response. 9. Maintain an inventory of all deployed DWR-M920 devices to ensure comprehensive coverage of mitigation efforts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-15193: Buffer Overflow in D-Link DWR-M920
Description
A vulnerability was detected in D-Link DWR-M920 up to 1.1.50. This affects the function sub_423848 of the file /boafrm/formParentControl. Performing manipulation of the argument submit-url results in buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-15193 is a critical buffer overflow vulnerability identified in the D-Link DWR-M920 router firmware versions 1.1.0 through 1.1.50. The vulnerability resides in the function sub_423848 located in the /boafrm/formParentControl file. Specifically, the issue arises from improper handling of the 'submit-url' parameter, which can be manipulated to overflow a buffer. This overflow can lead to arbitrary code execution with elevated privileges, as the router firmware likely runs with high system rights. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 score of 8.7 reflects the ease of exploitation (network vector, low complexity), lack of required privileges or user interaction, and the high impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public availability of exploit code significantly raises the threat level. The DWR-M920 is a widely deployed 4G LTE router used in various enterprise and industrial environments, making this vulnerability particularly concerning. Attackers exploiting this flaw could gain persistent control over the device, intercept or manipulate network traffic, disrupt connectivity, or use the device as a foothold for lateral movement within networks.
Potential Impact
For European organizations, the impact of CVE-2025-15193 is substantial. Compromise of D-Link DWR-M920 routers could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of critical services relying on these devices for connectivity. Industrial and enterprise sectors using these routers for remote or mobile network access are at heightened risk of operational downtime and data breaches. Given the router’s role as a network gateway, attackers could pivot to other internal systems, escalating the severity of the breach. The public exploit availability increases the likelihood of targeted attacks or opportunistic scanning campaigns across Europe. Organizations in sectors such as manufacturing, logistics, telecommunications, and public services that deploy these routers may face significant operational and reputational damage if exploited. Additionally, the lack of patches or delayed patching could prolong exposure, especially in environments where firmware updates are challenging to deploy rapidly.
Mitigation Recommendations
1. Immediate firmware update: Organizations should verify if D-Link has released a patch or updated firmware beyond version 1.1.50 and apply it promptly. 2. Disable remote management interfaces on the DWR-M920 to reduce attack surface. 3. Implement network segmentation to isolate vulnerable routers from critical internal networks. 4. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting the 'submit-url' parameter or related traffic anomalies. 5. Monitor network traffic for unusual patterns or spikes in requests to the /boafrm/formParentControl endpoint. 6. Where patching is not immediately feasible, consider temporary compensating controls such as firewall rules blocking external access to router management ports. 7. Conduct regular vulnerability scanning and penetration testing focusing on network edge devices. 8. Educate IT staff on the risks and signs of exploitation to enable rapid incident response. 9. Maintain an inventory of all deployed DWR-M920 devices to ensure comprehensive coverage of mitigation efforts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-28T09:10:14.904Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450badb813ff03e2bf7bd
Added to database: 12/30/2025, 10:22:50 PM
Last enriched: 12/30/2025, 11:39:56 PM
Last updated: 2/7/2026, 7:56:56 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2077: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.